Check for responsible selection of encryption algorithms
If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.
|Result positive||Responsible selection of encryption algorithms|
|Result negativ||Irresponsible selection of encryption algorithms|
|Description||Your server is configured so that the encryption algorithms of the visitor are preferred to those of your server. Servers should not leave the choice of encryption algorithms to your customers, but should actively select strong connections.|
|Background||Usually your server determines the encryption algorithms of the connection, not the other way around. Similar to the real world, you have house rules on your server - you define the rules, the guest has to follow them. You should not leave it to chance whether your connections are secure.|
|Consequence||You leave it to the visitor of your server to decide how securely they communicate.|
|Solution/Tips||If irresponsible selection of encryption algorithms has been reported, configure your web server so that your web server determines the encryption algorithms for communication between your server and the user's mail program.|